We performed a comparison between Check Point Full Disk Encryption Software Blade and Cisco Secure Endpoint based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption."The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"This encryption is relatively fast and really covers the needs required."
"This software has helped individuals in the organization avoid data loss."
"The initial setup is easy."
"Encryption prevents data loss which can cost the organization a lot of resources."
"It's easily scalable and adaptable to the needs of the business."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"The product provides sandboxing options like file reputation and file analysis."
"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"The most valuable feature is signature-based malware detection."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"The most valuable features of this solution are the IPS and the integration with ISE."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"There are several valuable features including strong prevention and exceptional reporting capabilities."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"I would like to bring centralized management to mobile devices."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"Regarding the general topic of support, many have annoyances with it."
"They could improve the latency in the platform when entering the portal."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"Sometimes the performance rates are not consistent."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"The pricing policy could be more competitive, similar to Cisco's offerings."
"I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"I would like to see integration with Cisco Analytics."
"An easier way to do deduplication of machines, or be alerted to the fact that there's more than one instance of a machine, would be useful... That way you could get a more accurate device count, so you're not having an inflated number."
"The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while Cisco Secure Endpoint is ranked 10th in Endpoint Protection Platform (EPP) with 43 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Cisco Secure Endpoint is rated 8.6. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Cisco Secure Endpoint writes "Single dashboard management, quick infrastructure threat detection, and high level support". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker and McAfee Complete Data Protection, whereas Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon, Check Point Harmony Endpoint and VMware Carbon Black Endpoint.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.